


default search action
EuroSys 2020: Heraklion, Greece
- Angelos Bilas, Kostas Magoutis, Evangelos P. Markatos, Dejan Kostic, Margo I. Seltzer:

EuroSys '20: Fifteenth EuroSys Conference 2020, Heraklion, Greece, April 27-30, 2020. ACM 2020, ISBN 978-1-4503-6882-7
Cloud computing/systems for ML/ML for systems I
- Shubham Chaudhary

, Ramachandran Ramjee, Muthian Sivathanu, Nipun Kwatra, Srinidhi Viswanatha:
Balancing efficiency and fairness in heterogeneous GPU clusters for deep learning. 1:1-1:16 - Liangyi Gong, Zhenhua Li, Feng Qian, Zifan Zhang, Qi Alfred Chen, Zhiyun Qian, Hao Lin

, Yunhao Liu:
Experiences of landing machine learning onto market-scale mobile malware detection. 2:1-2:14
Kernel/efficient data structures/programming languages and verification I
- Baptiste Lepers, Redha Gouicem

, Damien Carver, Jean-Pierre Lozi, Nicolas Palix
, Maria-Virginia Aponte, Willy Zwaenepoel, Julien Sopena, Julia Lawall, Gilles Muller:
Provable multicore schedulers with Ipanema: application to work conservation. 3:1-3:16 - Charalampos Stylianopoulos, Ivan Walulya, Magnus Almgren

, Olaf Landsiedel, Marina Papatriantafilou:
Delegation sketch: a parallel design with support for fast and accurate concurrent operations. 4:1-4:16 - Andreia Correia, Pascal Felber

, Pedro Ramalhete:
Persistent memory and the rise of universal constructions. 5:1-5:15 - Jan Nordholz:

Design of a symbolically executable embedded hypervisor. 6:1-6:16 - Meni Orenbach, Andrew Baumann, Mark Silberstein:

Autarky: closing controlled channels with self-paging enclaves. 7:1-7:16
Kernel/efficient data structures/programming languages and verification II
- Alex Kogan, Dave Dice, Shady Issa

:
Scalable range locks for scalable address spaces and beyond. 8:1-8:15 - Yuvraj Patel, Leon Yang, Leo Prasath Arulraj, Andrea C. Arpaci-Dusseau

, Remzi H. Arpaci-Dusseau, Michael M. Swift:
Avoiding scheduler subversion using scheduler-cooperative locks. 9:1-9:17 - Chi Li, Shu Wang

, Henry Hoffmann, Shan Lu
:
Statically inferring performance properties of software configurations. 10:1-10:16 - Hsuan-Chi Kuo, Dan Williams, Ricardo Koller, Sibin Mohan:

A Linux in unikernel clothing. 11:1-11:15
Cloud computing/systems for ML/ML for systems II
- Amir Hossein Nodehi Sabet, Zhijia Zhao, Rajiv Gupta

:
Subway: minimizing data transfer during out-of-GPU-memory graph processing. 12:1-12:16 - Kasra Jamshidi

, Rakesh Mahadasa, Keval Vora
:
Peregrine: a pattern-aware graph mining system. 13:1-13:16 - Emmanuel Amaro, Christopher Branner-Augmon, Zhihong Luo, Amy Ousterhout, Marcos K. Aguilera, Aurojit Panda, Sylvia Ratnasamy

, Scott Shenker:
Can far memory improve job throughput? 14:1-14:16 - Vikram Sreekanti, Chenggang Wu, Saurav Chhatrapati, Joseph E. Gonzalez

, Joseph M. Hellerstein, Jose M. Faleiro:
A fault-tolerance shim for serverless computing. 15:1-15:15 - Krzysztof Rzadca, Pawel Findeisen, Jacek Swiderski, Przemyslaw Zych, Przemyslaw Broniek, Jarek Kusmierek, Pawel Nowak, Beata Strack

, Piotr Witusowski, Steven Hand, John Wilkes:
Autopilot: workload autoscaling at Google. 16:1-16:16 - Adriana Szekeres, Michael J. Whittaker, Jialin Li, Naveen Kr. Sharma, Arvind Krishnamurthy

, Dan R. K. Ports, Irene Zhang:
Meerkat: multicore-scalable replicated transactions following the zero-coordination principle. 17:1-17:14
Scheduling/resilience/security in the cloud
- Wenjia Zhao, Kangjie Lu, Yong Qi, Saiyu Qi:

MPTEE: bringing flexible and efficient memory protection to Intel SGX. 18:1-18:15 - Laiping Zhao, Yanan Yang

, Kaixuan Zhang, Xiaobo Zhou, Tie Qiu, Keqiu Li, Yungang Bao:
Rhythm: component-distinguishable workload deployment in datacenters. 19:1-19:17 - Tatiana Jin, Zhenkun Cai, Boyang Li, Chengguang Zheng, Guanxian Jiang, James Cheng:

Improving resource utilization by timely fine-grained scheduling. 20:1-20:16 - Hyungjun Oh, Bongki Cho, Changdae Kim

, Heejin Park, Jiwon Seo:
AniFilter: parallel and failure-atomic cuckoo filter for non-volatile memories. 21:1-21:15 - Jingwei Li

, Zuoru Yang, Yanjing Ren
, Patrick P. C. Lee
, Xiaosong Zhang:
Balancing storage efficiency and data confidentiality with tunable encrypted deduplication. 22:1-22:15
Networking/distributed systems/storage systems/NVM
- Paulo Gouveia, João Neves, Carlos Segarra, Luca Liechti, Shady Issa

, Valerio Schiavoni
, Miguel Matos
:
Kollaps: decentralized and dynamic topology emulation. 23:1-23:16 - Vitor Enes

, Carlos Baquero
, Tuanir França Rezende, Alexey Gotsman, Matthieu Perrin, Pierre Sutra
:
State-machine replication for planet-scale systems. 24:1-24:15 - Marios Kogias, Edouard Bugnion:

HovercRaft: achieving scalability and fault-tolerance for microsecond-scale datacenter services. 25:1-25:17 - Eitan Rosenfeld, Aviad Zuck, Nadav Amit

, Michael Factor, Dan Tsafrir:
RAIDP: replication with intra-disk parity. 26:1-26:17 - Eran Gilad, Edward Bortnikov, Anastasia Braginsky, Yonatan Gottesman, Eshcar Hillel, Idit Keidar, Nurit Moscovici, Rana Shahout:

EvenDB: optimizing key-value storage for spatial locality. 27:1-27:16 - Robert Schmid, Max Plauth

, Lukas Wenzel, Felix Eberhardt, Andreas Polze:
Accessible near-storage computing with FPGAs. 28:1-28:12 - David Sidler, Zeke Wang, Monica Chiosa

, Amit Kulkarni, Gustavo Alonso:
StRoM: smart remote memory. 29:1-29:16
Cloud computing/systems for ML/ML for systems III
- Muhammad Tirmazi, Adam Barker, Nan Deng, Md E. Haque, Zhijing Gene Qin, Steven Hand, Mor Harchol-Balter

, John Wilkes:
Borg: the next generation. 30:1-30:14 - Tan N. Le, Xiao Sun, Mosharaf Chowdhury, Zhenhua Liu:

AlloX: compute allocation in hybrid clusters. 31:1-31:16 - James Cadden, Thomas Unger, Yara Awad, Han Dong

, Orran Krieger, Jonathan Appavoo:
SEUSS: skip redundant paths to make serverless fast. 32:1-32:15 - Shichang Xu, Subhabrata Sen, Z. Morley Mao:

CSI: inferring mobile ABR video adaptation behavior under HTTPS and QUIC. 33:1-33:16
Kernel/efficient data structures/programming languages and verification III
- Yingtong Liu, Hsin-Wei Hung, Ardalan Amiri Sani:

Mousse: a system for selective symbolic execution of programs with untamed environments. 34:1-34:15 - Nadav Amit

, Amy Tai, Michael Wei:
Don't shoot down TLB shootdowns! 35:1-35:14 - Anil Altinay, Joseph Nash, Taddeus Kroes

, Prabhu Rajasekaran, Dixin Zhou, Adrian Dabrowski
, David Gens, Yeoul Na, Stijn Volckaert
, Cristiano Giuffrida
, Herbert Bos
, Michael Franz:
BinRec: dynamic binary lifting and recompilation. 36:1-36:16 - Seongjae Park, Paul E. McKenney, Laurent Dufour, Heon Y. Yeom:

An HTM-based update-side synchronization for RCU on NUMA systems. 37:1-37:15 - Dayeol Lee, David Kohlbrenner, Shweta Shinde

, Krste Asanovic, Dawn Song:
Keystone: an open framework for architecting trusted execution environments. 38:1-38:16 - Ankur Dave, Chester Leung, Raluca Ada Popa, Joseph E. Gonzalez

, Ion Stoica:
Oblivious coopetitive analytics using hardware enclaves. 39:1-39:17
Cloud computing/systems for ML/ML for systems IV
- Arya Mazaheri

, Tim Beringer, Matthew W. Moskewicz, Felix Wolf, Ali Jannesari
:
Accelerating winograd convolutions using symbolic computation and meta-programming. 40:1-40:14 - Guangyuan Piao

, Patrick K. Nicholson, Diego Lugones:
Env2Vec: accelerating VNF testing with deep learning. 41:1-41:16 - Bo Sang, Pierre-Louis Roman

, Patrick Eugster, Hui Lu, Srivatsan Ravi, Gustavo Petri:
PLASMA: programmable elasticity for stateful cloud computing applications. 42:1-42:15 - Daniele Rogora, Antonio Carzaniga

, Amer Diwan, Matthias Hauswirth, Robert Soulé
:
Analyzing system performance with probabilistic performance annotations. 43:1-43:14

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














